top of page
Search
Dec 1, 20193 min read
Insider Threat Risk - Blast Radius Perspective
The management of insider threats is a complex and often under-thought process - people who work on it appreciate the subtlety and...
309
Nov 24, 20192 min read
Alternative Risk Management Strategies.
Much focus of risk mitigation is about implementing controls: preventative, detective and reactive. This is necessary in most cases, and...
1,457
Nov 17, 20192 min read
Simple Rules of (InfoSec) Career Success
Over the years I made note of what behaviors I’ve seen from successful people. By success, I mean getting results, increase span of...
282
Nov 10, 20191 min read
Shrines of Failure
I was at an event recently where one participant talked passionately about a disaster they had that they have since preserved artifacts...
669
Oct 26, 20191 min read
Career Longevity & "The Don't Fire Me Chart"
To fix anything sustainably requires long term action. This is especially true in technology risk and cybersecurity. The trouble is this...
4,184
Oct 20, 20192 min read
Risk Management is not only about Reducing Risk
It seems most risk and security programs, and instruction on how to run risk and security programs, focus exclusively on assessing risk,...
620
Oct 5, 20192 min read
The Stress and Joy of Security Jobs
A few months ago there was this whole thing about the stress of security roles, CISOs self-medicating, and a whole range of burn-out...
1,542
Sep 29, 20193 min read
Cybersecurity is not the only Technology Risk
Cybersecurity is not the only technology risk, in fact, when you total up actual losses it is likely not even the biggest risk. Although...
518
Sep 15, 20193 min read
Security Program Tactics
When starting or reinvigorating a security program, focus on a small number of meta-objectives that can have sustained outsize effects -...
558
Sep 1, 20192 min read
Vulnerability Management
I don’t see much written on vulnerability management in more holistic terms vs. patch/bug fixing. This might be ok given a lot of...
228
Aug 17, 20192 min read
Cybersecurity as a First Class Business Risk
I see a lot of commentary on the need to “treat cyber/info-security as a business issue not an IT issue”. The problem is it implies that...
396
Aug 12, 20193 min read
Controls
Many well-known security incidents appear to have a common pattern. They are not the result of some awesome attacker capability to...
1,061
bottom of page